Security StrategiesNetwork World's Security Strategies Newsletter, 05/10/07Secuware Security Framework offers interesting functionalityBy M. E. KabayOrganizations differ in the amount of control that is necessary and appropriate for information circulating among people who work together. In some organizations, it makes sense to maintain a liberal policy of openness and sharing of corporate data; the philosophy behind such openness is that information exchange can lead to unexpected benefits well beyond the risks of sharing. Entrepreneurial startups with small groups of enthusiastic, creative people collaborating closely on new ways of doing business can be ideal places for a permissive security posture based on the need to conceal rather than the need to know. On the other hand, for organizations with highly sensitive data pertinent to limited subsets of employees, a more restrictive need-to-know posture might make more sense. Controlling access to information within an organization while fostering appropriate information exchange by authorized personnel are conflicting challenges for enterprise security managers.
I recently received a white paper on this subject from Secureware entitled “Closed Circuits for Information: 360-degree Data Protection for the Enterprise” and found it to be unusually well-written and informative. The Secuware Security Framework (SSF) is an add-on for the Windows operating system. According to the white paper, it offers strong identification and authentication coupled with whole-system encryption that can be extended to network devices and removable media. Some of the significant features I noted include the following: * Pre-boot authentication that is resistant to typical bypasses such as booting from alternative media; The white paper includes a comparative analysis with Microsoft Vista BitLocker, the new whole-disk encryption functions available under Vista Enterprise. I hope that some readers of this column will find the white paper interesting and useful. [Disclaimer: I have no relationship whatever with Secuware.]
|
| Contact the author: M. E. Kabay, Ph.D., CISSP-ISSMP, is Associate Professor of Information Assurance and CTO of the School of Graduate Studies at Norwich University in Northfield, Vt. Mich can be reached by e-mail and his Web site. Two valuable (ISC)2 seminars coming up in May and June: End-to-End-Digital Investigation on May 31 in Denver and INFOSEC Update June 4-5 in Marina del Rey. ARCHIVEArchive of the Security Strategies Newsletter. BONUS FEATUREIT PRODUCT RESEARCH AT YOUR FINGERTIPS Get detailed information on thousands of products, conduct side-by-side comparisons and read product test and review results with Network World’s IT Buyer’s Guides. Find the best solution faster than ever with over 100 distinct categories across the security, storage, management, wireless, infrastructure and convergence markets. Click here for details. PRINT SUBSCRIPTIONS AVAILABLE International subscribers, click here. SUBSCRIPTION SERVICESTo subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here. This message was sent to: security.world@gmail.com. Please use this address when modifying your subscription. Advertising information: Write to Associate Publisher Online Susan Cardoza Network World, Inc., 118 Turnpike Road, Southborough, MA 01772 Copyright Network World, Inc., 2007 |
No comments:
Post a Comment